[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVEs, Crypto and "vulnerabilities"
From:       Tim <tim-security () sentinelchicken ! org>
Date:       2014-03-31 16:10:20
Message-ID: 20140331161019.GG2642 () sentinelchicken ! org
[Download RAW message or body]

> I understand CVE guidance as "security issue in CVE sense, when
> assumptions for code are not met by the implementation"
> 
> It is not clear what the assumption is here, what should be the result of the encryption
> and where should it be stored?
> 
> Is it mostly obfuscation? Or secure storage of content?


This is a good way to frame the question.

It isn't clear to me, in this specific instance, how the tokens are
used or how an attacker could mess with the ciphertext.  This is
simply because I'm too busy to read up on the issue.

However, in general, here's the typical assumptions developers make
about encryption (with ECB mode) and how the implementation fails to
meet those:

1. ECB mode encryption provides secrecy

   - Partially fails this assumption since repeated plaintext blocks
     result in repeated ciphertext blocks


2. ECB mode encryption provides integrity

   - Badly fails this assumption since ciphertext blocks can be
     duplicated/swapped, rearranged at will.  If due to the context of
     the encryption, if an attacker can conduct a partial
     chosen-plaintext attack, typically whole ciphertexts can be
     forged.


So depending on the context, it is clear that this could qualify for a
CVE in a well-defined way.

tim
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic